messages from 2026-03-19 17:35:16 to 2026-03-27 22:13:05 UTC [more...]
[PATCH v2 00/16] fs,x86/resctrl: Add kernel-mode (e.g., PLZA) support to the resctrl subsystem
2026-03-27 22:11 UTC (11+ messages)
` [PATCH v2 01/16] fs/resctrl: Add kernel mode (kmode) data structures and arch hook
` [PATCH v2 02/16] fs, x86/resctrl: Add architecture routines for kernel mode initialization
[GIT PULL] Confidential Computing: Attestation fixes for 7.0-rc6
2026-03-27 20:55 UTC
[PATCH v5 0/2] dma-buf: heaps: system: add an option to allocate explicitly shared/decrypted memory
2026-03-27 19:43 UTC (7+ messages)
` [PATCH v5 1/2] dma-mapping: introduce DMA_ATTR_CC_SHARED for shared memory
` [PATCH v5 2/2] dma-buf: heaps: system: add system_cc_shared heap for explicitly "
[PATCH v2 0/7] Add RMPOPT support
2026-03-27 17:16 UTC (7+ messages)
` [PATCH v2 5/7] KVM: guest_memfd: Add cleanup interface for guest teardown
[PATCH v2 00/31] PCI/TSM: PCIe Link Encryption Establishment via TDX platform services
2026-03-27 16:01 UTC (32+ messages)
` [PATCH v2 01/31] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [PATCH v2 02/31] x86/virt/tdx: Move bit definitions of TDX_FEATURES0 to public header
` [PATCH v2 03/31] x86/virt/tdx: Add tdx_page_array helpers for new TDX Module objects
` [PATCH v2 04/31] x86/virt/tdx: Support allocating contiguous pages for tdx_page_array
` [PATCH v2 05/31] x86/virt/tdx: Extend tdx_page_array to support IOMMU_MT
` [PATCH v2 06/31] x86/virt/tdx: Read global metadata for TDX Module Extensions/Connect
` [PATCH v2 07/31] x86/virt/tdx: Embed version info in SEAMCALL leaf function definitions
` [PATCH v2 08/31] x86/virt/tdx: Configure TDX Module with optional TDX Connect feature
` [PATCH v2 09/31] x86/virt/tdx: Move tdx_clflush_page() up in the file
` [PATCH v2 10/31] x86/virt/tdx: Add extra memory to TDX Module for Extensions
` [PATCH v2 11/31] x86/virt/tdx: Make TDX Module initialize Extensions
` [PATCH v2 12/31] x86/virt/tdx: Enable the Extensions after basic TDX Module init
` [PATCH v2 13/31] x86/virt/tdx: Extend tdx_clflush_page() to handle compound pages
` [PATCH v2 14/31] PCI/TSM: Report active IDE streams per host bridge
` [PATCH v2 15/31] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v2 16/31] coco/tdx-host: Support Link TSM for TDX host
` [PATCH v2 17/31] acpi: Add KEYP support to fw_table parsing
` [PATCH v2 18/31] iommu/vt-d: Cache max domain ID to avoid redundant calculation
` [PATCH v2 19/31] iommu/vt-d: Reserve the MSB domain ID bit for the TDX module
` [PATCH v2 20/31] x86/virt/tdx: Add a helper to loop on TDX_INTERRUPTED_RESUMABLE
` [PATCH v2 21/31] x86/virt/tdx: Add SEAMCALL wrappers for trusted IOMMU setup and clear
` [PATCH v2 22/31] iommu/vt-d: Export a helper to do function for each dmar_drhd_unit
` [PATCH v2 23/31] coco/tdx-host: Setup all trusted IOMMUs on TDX Connect init
` [PATCH v2 24/31] coco/tdx-host: Add a helper to exchange SPDM messages through DOE
` [PATCH v2 25/31] x86/virt/tdx: Add SEAMCALL wrappers for SPDM management
` [PATCH v2 26/31] mm: Add __free() support for __free_page()
` [PATCH v2 27/31] coco/tdx-host: Implement SPDM session setup
` [PATCH v2 28/31] coco/tdx-host: Parse ACPI KEYP table to init IDE for PCI host bridges
` [PATCH v2 29/31] x86/virt/tdx: Add SEAMCALL wrappers for IDE stream management
` [PATCH v2 30/31] coco/tdx-host: Implement IDE stream setup/teardown
` [PATCH v2 31/31] coco/tdx-host: Finally enable SPDM session and IDE Establishment
SVSM Development Call March 25, 2026
2026-03-27 12:30 UTC (2+ messages)
[PATCH v2 00/19] PCI/TSM: TEE I/O infrastructure
2026-03-27 11:49 UTC (39+ messages)
` [PATCH v2 03/19] device core: Introduce confidential device acceptance
` [PATCH v2 08/19] PCI/TSM: Add "evidence" support
` [PATCH v2 09/19] PCI/TSM: Support creating encrypted MMIO descriptors via TDISP Report
` [PATCH v2 16/19] samples/devsec: Introduce a "Device Security TSM" sample driver
COCONUT-SVSM Development Release v2026.03-devel
2026-03-27 9:21 UTC
[PATCH 0/2] x86/tdx: Fix memory hotplug in TDX guests
2026-03-27 8:49 UTC (12+ messages)
` [PATCH 1/2] x86/tdx: Handle TDG.MEM.PAGE.ACCEPT success-with-warning returns
` [PATCH 2/2] x86/tdx: Accept hotplugged memory before online
[PATCH 0/2] struct page to PFN conversion for TDX guest private memory
2026-03-27 7:03 UTC (19+ messages)
` [PATCH 1/2] x86/virt/tdx: Use PFN directly for mapping "
` [PATCH 2/2] x86/virt/tdx: Use PFN directly for unmapping "
[PATCH v6 00/22] Runtime TDX module update support
2026-03-26 13:03 UTC (27+ messages)
` [PATCH v6 01/22] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v6 02/22] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v6 03/22] coco/tdx-host: Expose TDX module version
` [PATCH v6 04/22] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v6 05/22] x86/virt/seamldr: Add a helper to retrieve P-SEAMLDR information
` [PATCH v6 06/22] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v6 07/22] coco/tdx-host: Implement firmware upload sysfs ABI for TDX module updates
` [PATCH v6 08/22] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v6 09/22] x86/virt/seamldr: Introduce skeleton for TDX module updates
` [PATCH v6 10/22] x86/virt/seamldr: Abort updates if errors occurred midway
` [PATCH v6 11/22] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v6 12/22] x86/virt/tdx: Reset software states during TDX module shutdown
` [PATCH v6 13/22] x86/virt/seamldr: Install a new TDX module
` [PATCH v6 14/22] x86/virt/seamldr: Do TDX per-CPU initialization after updates
` [PATCH v6 15/22] x86/virt/tdx: Restore TDX module state
` [PATCH v6 16/22] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [PATCH v6 17/22] x86/virt/tdx: Avoid updates during update-sensitive operations
` [PATCH v6 18/22] coco/tdx-host: Don't expose P-SEAMLDR features on CPUs with erratum
` [PATCH v6 19/22] x86/virt/tdx: Enable TDX module runtime updates
` [PATCH v6 20/22] coco/tdx-host: Document TDX module update compatibility criteria
` [PATCH v6 21/22] x86/virt/tdx: Document TDX module update
` [PATCH v6 22/22] x86/virt/seamldr: Log TDX module update failures
[PATCH v13 00/48] arm64: Support for Arm CCA in KVM
2026-03-26 11:22 UTC (61+ messages)
` [PATCH v13 05/48] arm64: RMI: Temporarily add SMCs from RMM v1.0 spec
` [PATCH v13 07/48] arm64: RMI: Check for RMI support at KVM init
` [PATCH v13 12/48] arm64: RMI: Basic infrastructure for creating a realm
` [PATCH v13 15/48] arm64: RMI: RTT tear down
` [PATCH v13 17/48] arm64: RMI: Allocate/free RECs to match vCPUs
` [PATCH v13 20/48] arm64: RMI: Handle realm enter/exit
` [PATCH v13 21/48] arm64: RMI: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v13 23/48] KVM: arm64: Expose support for private memory
` [PATCH v13 24/48] arm64: RMI: Allow populating initial contents
` [PATCH v13 26/48] arm64: RMI: Create the realm descriptor
` [PATCH v13 27/48] arm64: RMI: Runtime faulting of memory
` [PATCH v13 37/48] arm64: RMI: Prevent Device mappings for Realms
` [PATCH v13 39/48] arm64: RMI: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v13 45/48] arm64: RMI: Provide accurate register list
` [PATCH v13 46/48] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
[PATCH v2 3/7] x86/sev: add support for RMPOPT instruction
2026-03-26 2:14 UTC (6+ messages)
[PATCH 0/7] KVM: x86: APX reg prep work
2026-03-25 18:28 UTC (5+ messages)
[PATCH kernel 0/9] PCI/TSM: coco/sev-guest: Implement SEV-TIO PCIe TDISP (phase2)
2026-03-25 10:42 UTC (12+ messages)
` [PATCH kernel 4/9] dma/swiotlb: Stop forcing SWIOTLB for TDISP devices
[PATCH v4 0/2] dma-buf: heaps: system: add an option to allocate explicitly decrypted memory
2026-03-24 19:11 UTC (8+ messages)
` [PATCH v4 1/2] dma-mapping: introduce DMA_ATTR_CC_DECRYPTED for pre-decrypted memory
` [PATCH v4 2/2] dma-buf: heaps: system: add system_cc_decrypted heap for explicitly decrypted memory
[PATCH net-next v3 0/2] dma-buf: heaps: system: add an option to allocate explicitly decrypted memory
2026-03-24 18:32 UTC (8+ messages)
[PATCH v2 0/5] Fuller TDX kexec support
2026-03-24 10:18 UTC (13+ messages)
` [PATCH v2 1/5] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [PATCH v2 2/5] x86/virt/tdx: Pull kexec cache flush logic into arch/x86
` [PATCH v2 3/5] x86/virt/tdx: Add SEAMCALL wrapper for TDH.SYS.DISABLE
` [PATCH v2 4/5] x86/tdx: Disable the TDX module during kexec and kdump
` [PATCH v2 5/5] x86/virt/tdx: Remove kexec docs
[PATCH v3 2/3] swiotlb: dma: its: Enforce host page-size alignment for shared buffers
2026-03-23 13:52 UTC (3+ messages)
[PATCH v5 00/22] Runtime TDX module update support
2026-03-23 2:14 UTC (20+ messages)
` [PATCH v5 09/22] x86/virt/seamldr: Introduce skeleton for TDX module updates
` [PATCH v5 10/22] x86/virt/seamldr: Abort updates if errors occurred midway
` [PATCH v5 11/22] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v5 13/22] x86/virt/seamldr: Install a new "
` [PATCH v5 17/22] x86/virt/tdx: Avoid updates during update-sensitive operations
` [PATCH v5 22/22] x86/virt/seamldr: Log TDX module update failures
[PATCH] KVM: TDX: Fix APIC MSR ranges in tdx_has_emulated_msr()
2026-03-19 19:33 UTC (6+ messages)
[PATCH] sample/tsm-mr: Use SHA-2 library APIs
2026-03-19 17:51 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox